Who are you and what can you do? Identity Management Faust Gorham University of California, Merced 12/7/2004.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

Enterprise Architecture 2013 ITLC & ITAG Leadership Meeting Discussion Points April 9, 2013.
1 Collaborators at the Gates of Troy: Extending eServices at USC.
Kantara: From IRM to Context. The World of Access Keeps Expanding App sourcing and hosting User populations App access channels SasS apps Apps in public.
Identity Management Choosing and Using Sun’s Identity Management Suite March 13 th, 2007 Kim Tracy Executive Director University Computing Services Northeastern.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Environmental Terminology System and Services (ETSS) June 2007.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Notification Service JA-SIG June 6, 2006 One stop shopping Jon Atherton Mark Mara.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Peter Deutsch Director, I&IT Systems July 12, 2005
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
PENN Community Project SUG Presentation April 8, 2002.
Academic Services Interactive Media Managing the Web with Java JA-SIG Winter 2002 Robert Sherratt Academic Services, Interactive Media.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Optimizing Business Operations Business Priorities Presentation.
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Test Automation: An Architected Approach Dan Young March 17th, 2005
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Microsoft Identity and Access Solutions Market Trends and Futures
1 No More Paper, No More Stamps: Targeted myWSU Communications Lavon R. Frazier April 27, 2005 Copyright Lavon R. Frazier, This work is the intellectual.
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Georgia State University Case.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The UF Directory Project Project Leader: Warren Curry, Information Systems Project Project Web Site:
SITS integration with Blackboard in a Federal HE context; Management perspective on what is ‘advanced’ now Nancy Turner Associate Dean: Professional Development.
Web Services (Part 1) Service-Oriented Architecture Overview ITEC 625 Web Development Fall 2006 Reference: Web Services and Service-Oriented Architectures.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
- 1 - Roadmap to Re-aligning the Customer Master with Oracle's TCA Northern California OAUG March 7, 2005.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Are you feeling secure ? Lee Donaldson Information Builders.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
ArcGIS Server for Administrators
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SAP Identity Management 7.2 Implementation
Imagining a Community Source Student Services System Leo Fernig Richard Spencer SOA Workshop Vancouver March 24, 2006.
Enterprise Service Desk (ESD) Enterprise Service Desk for Notification / Knowledge Article Authors.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Identity Management and RIAS November 2010 Don Smith OIT, Rutgers University.
Development of the West Virginia University Electronic Theses & Dissertations System Presented By Haritha Garapati at ETD the 7 th International.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Stanford University & National Student Clearinghouse Shibboleth Pilot CAMP Phoenix, AZ February 5, 2009.
Data Integration with Veracross Wednesday, June 23 rd Lauren Banks.
Microsoft Identity Integration Server & Role Base Access Theo Kostelijk Consultant Microsoft BV
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
1 Name of Meeting Location Date - Change in Slide Master Authentication & Authorization Technologies for LSST Data Access Jim Basney
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
How to Use Social Media, Identity Management, and Your Campus Portal to Efficiently and Effectively Communicate with Students Sarah Alpert, Senior Project.
Using Your Own Authentication System with ArcGIS Online
Identity Management (IdM)
ESA Single Sign On (SSO) and Federated Identity Management
Identity Management at the University of Florida
Presentation transcript:

Who are you and what can you do? Identity Management Faust Gorham University of California, Merced 12/7/2004

Agenda Identity Management UC Merced - growth Challenges Goals Architecture Path – Lessons Learned Quick Demo Q&A

What is Identity Management “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities” The Burton Group

What Identity Management means to us The processes and technologies we will use to uniquely identify a person and what their affiliations are at UC Merced. Maintaining attributes for each person, including roles. Providing a unique identifier to each person that can be used for authentication and authorization.

UC Merced Staff UCOP , thoughts of rolling out Exchange

UC Merced Faculty 12 Grad Students 310 Staff Sun and Directory Oracle Calendar Banner SIS uPortal Library System (Innovative Integrated Interfaces)

UC Merced – August 2005 Targets: 60 Faculty 100 Grad Students 900 Students 500 Staff Sun and Directory Oracle Calendar Banner SIS uPortal SAKAI IDM Library, Housing (StarRez), Campus Card (Diebold), Dining, Facilities, Police

Challenges How do we deal with our user population growth? How do we give access to services and resources? How do we reduce costs and staff time necessary to manage users? How do we reduce silo building and duplication of user data in downstream systems? How do we prepare for SSO/WebISO? The Library will use RFID for book lending. How do we manage library privileges for lending, Inter-Library Loan? Access to buildings will be controlled by card readers. How do we provision access to users quickly? We have on average a 8 day lag between when a new staff or faculty member joins UC Merced and when their account is provisioned. How can we reduce that? How do we reduce double entry – SOR and then IT enters in Directory? Moving target of laws and regulations requiring different data policies.

Goal/Solution Create an identity management system that will provide a single repository to maintain contact, affiliation, relationship and role information about UC Merced users.

Technical Goals 1. Create business rules that determine how we define, modify, provision and deprovision: 1. Faculty, Staff, Students, Affiliates, Alumni 2. Create interfaces from our Systems of Record to the Identity Management system. 3. Create a unique identifier for each person coming from a SoR. 4. Create an attribute map that identifies for each affiliation/combo what fields we pull from which SoR, who owns them, who determines access/updates. 5. Populate LDAP and AD with all information necessary to provide authentication, personal information, affiliations, roles and relationships. 6. Develop automated tools for provisioning accounts that require “push” of data such as and calendar. 7. Create self-service tools allowing MSOs to make user and group changes to data not owned by the SoR. Furthermore, create initial user entry tools. 8. Create self-service tools allowing end users to modify their directory information (alternate phone, cell phone) and reset their passwords. 9. Integrate all self-service tools into uPortal

UCM IT Architecture - Current Manual & Automated Processes IT Staff Calendar VPN Course Mgmt Document Mgmt LDAP RADIUS Directory Services Data feeds Look-ups Active Directory Portal Desktops

UCM IT Architecture - Goal Outreach DB Student System Payroll Personnel System Alumni System Affiliates DB Identity Management Data feeds Look-ups SIS Self- Service Calendar Remote Access VPN Course Mgmt Document Mgmt RADIUS Directory Services Portal Print Servers Desktops Campus Card Library System LDAP Active Directory

Our Path Identify the goals Determine benefits and drivers Develop sponsors and key support relationships Develop the project plan including all risks and potential roadblocks. Create the development team and the oversight group. Develop the project requirements and functional specification. Open presentation to entire campus for dissemination, input and support. Determine build vs. buy by evaluating the current product landscape, our resources and time available. Used Sun’s iForce center for evaluation and tested other products Acquire technical systems and setup necessary components. Implement the project. Phase I – Handle our inaugural applicants and provide LDAP logins to Banner Self Service (Mini Phase I – Complete, Full Phase I done 1/31/2005 Phase II – Develop ties to our Payroll Personnel System – 3/15/2005 Phase III – Develop additional ties to Banner for applicant to student transition – 4/1/2005 Phase IV – Create an Affiliates System and link to IDM – 6/1/2005 Communicate constantly with our constituents. Demonstrate value of IDM, demonstrate self-service capabilities, talk about next steps after IDM (WebISO)

Implementation - Phase I Develop applicant extract from Banner Import extract into IDM Apply rules to extract and assign UCMNetIDs Populate LDAP Modify Banner to use LDAP logins for Self Service. Create a tool to allow applicant self-claiming of UCMNetIDs After claim inform applicants

Lessons Learned Oracle does not support Secure LDAP with third party directory servers. We used TLS as a way to get around this. We used Oracle Wallets We have a tiered SIS implementation and the Wallet needed to sit on the database server. Import root certificate into the Wallet. Self-service web server has issues with setting up the search scope. LDAP log files are our friends. Password gets re-encrypted on submit, so erase and enter password again. Access to qualified SUN resources limited

Build vs. Buy Merced currently has a lack of staff resources One full time developer We are 6 months away from needing our IDM system Our list of critical projects needed by opening will take about 11 months Build not an option, buy instead Top products in the Market  Sun Identity Manager, Netegrity Identity Minder, Tivoli Identity Manager

Implementation – Phase I to II Develop resources to link to SOR Write business rules in IDM to process SOR data Join the systems to create one master record Convert manual processes to automated ones for provisioning into applications Populate LDAP, AD, Library, Campus Card from IDM Provision accounts into push systems After claim send postcards

Phase II – Lessons learned so far Spend as much time as you can going over your business processes with your key users Document BP and present for approval Politics, politics, politics Gaining access to addresses and SSN from data stewards difficult to acquire One way hashing of SSN in the IDM repository reduced data steward’s anxiety Store cross-system information in the IDM repository UCMUniqueID, SSID, EmployeeID, UCMercedNetID, SSN (hashed) Create processes to provide one identifier and request another. SIS group asked for Oracle based lookup WS? We are tied to Sun

Info about Identity Manager J2EE based Support for XML, SOAP and Java Repository will be Oracle RDBMS (supports others) Concept of Resource Adapters will allow us to link Sun’s Directory Server Active Directory Flat File However it can connect to any major system through established resources, also custom interfaces can be developed. Supports SAML (Security Assertion Markup Language) and SPML (Services Provisioning Markup Language) Business Process Editor built-in for creating workflows XPRESS  XML based language

IDM Continued

In XPRESS we can call Java functions and pass arguments from workflow variables accountId status

Quick Demo

Additional Resources The Enterprise Directory Implementation Roadmap Internet 2 – Middleware

Q&A